A Seamless Lawful Interception Architecture for Mobile Users in IEEE 802.16e Networks

  • Lee, Myoung-Rak (Department of Computer Science and Engineering, Korea University) ;
  • Lee, Taek (Department of Computer Science and Engineering, Korea University) ;
  • Yoon, Byung-Sik (Department of WiBro Convergence Research Team, ETRI) ;
  • Kim, Hyo-Gon (Department of Computer Science and Engineering, Korea University) ;
  • In, Hoh Peter (Department of Computer Science and Engineering, Korea University)
  • 발행 : 2009.12.31

초록

Lawful interception (LI) involves legally accessing private communication such as telephone calls or email messages. Numerous countries have been drafting and enacting laws concerning the LI procedures. With the proliferation of portable Internet services such as the IEEE 802.16e wireless mobile networks, surveillance over illegal users is an emerging technical issue in LI. The evermigrating users and their changing IP's make it harder to provide support for seamless LI procedures on 802.16e networks. Few studies, however, on seamless LI support have been conducted on the 802.16e mobile networks environments. Proposed in this paper are a seamless LI architecture and algorithms for the 802.16e networks. The simulation results demonstrate that the proposed architecture improves recall rates in intercepting mobile user, when compared to the existing LI architectures.

키워드

참고문헌

  1. ETSI TS 101.671: Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic, 2009
  2. [Online]. Available: http://www.newport-networks.com/cust-docs/87-Law ful-Intercept.pdf
  3. 3GPP TS 33.106: Technical Specification Group Services and System Aspects; 3G Security; Lawful interception requirements (Release 5), 2002
  4. ETSI ES 201 158: Telecommunications security; Lawful Interception (LI); Requirements for network functions, 2002
  5. ETSI TS 101 331: Telecommunications Security; Lawful Interception (LI); Requirements of law enforcements agencies
  6. ETSI, ES 201 671: Telecommunications Security; Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic, 2007
  7. ETSI, TR 101 944: Telecommunications Security; Lawful Interception (LI); Issues on IP interception, 2001
  8. M. Gorge, "Lawful interception key concepts, actors, trends and best practice considerations," Elsevier Computer Fraud & Security, vol. 2007, no. 9, Sept. 2007, pp. 10–14 https://doi.org/10.1016/S1361-3723(07)70116-1
  9. S. Gleave, "The mechanics of lawful interception," Netw. Security, vol. 2007, no. 5, pp 8–11, 2007 https://doi.org/10.1016/S1353-4858(07)70034-X
  10. Accreditation: A Proven Management Model, 2008. [Online]. Available: http://www.calea.org/Online/AnnualReports/annual-reports.htm
  11. ETSI TS 141 033: Digital cellular telecommunications system (Phase 2+); Lawful interception requirement for GSM (3GPP TR 41.033 version 8.0.0 Release8), 2009
  12. National Handover Interface Specification version 1.0, Home Office, 2002. [Online]. Available: http://www.gliif.org/standards.htm
  13. RFC2804 IETF, Policy on Wiretapping, 2000
  14. ETSI, TS 102 232-1: Lawful Interception (LI); Handover specification for IP delivery, 2008
  15. Communications Assistance for Law Enforcement Act of 1994 (CALEA), Pub. L. No. 103–414, 108 Stat. 4279, Congress of the United States of America
  16. ETSI TS 101 331: Technical Specification Lawful Interception (LI); Requirements of law enforcement agencies, 2006
  17. B. Karpagavinayagam, R. State, and O. Festor, "Monitoring architecture for lawful interception in VoIP networks," in Proc. IEEE ICIMP, 2007
  18. A. Milannovic and I. Matosevic, "Distributed system for lawful interception in VoIP networks," in Proc. EUROCON, 2003
  19. ETSI TR 101.514: Digital Cellular Telecommunications System (Phase 2+); lawful interception requirement for GSM, 2001
  20. "WiMAX Lawful Interception for Communication Service Providers," Verint Systems white paper, 2008